When it comes to cybercrime, it seems no enterprise goes unscathed. There are more breaches happening, the associated costs are rising, and business leadership grows increasingly concerned that information security remains a challenge that is out of control. Those are the headline findings of the 2014 U.S. State of Cybercrime Survey, an annual survey by CSO Magazine with help from the U.S. Secret Service, the Software Engineering Institute at Carnegie Mellon University, and PwC.The 12th survey of cybercrime trends, released this week, found on average, the number of security incidents detected by enterprises reached 135 per organization. Unfortunately, more than two thirds of organizations that detected breaches are unable to place a cost on the incidents, and for those that could the average loss totaled $415,000.\u201cDespite substantial investments in cybersecurity technologies, cyber criminals continue to find ways to circumvent these technologies in order to obtain sensitive information that they can monetize,\u201d said Ed Lowery, special agent in charge, criminal investigative division, at the U.S. Secret Service in a release.Bob Bragdon, vice president and publisher, CSO says things are getting worse despite efforts in the right direction. \u201cThings continue to get worse despite the investment in people, processes and technologies to counter cyber threats,\u201d he says. Bragdon cites the fact that companies still do not strategically invest in security, so that they are protecting their most valuable assets, such as intellectual property and trade secrets.[Related: The sorry state of cybercrime]Another challenge: security isn\u2019t keeping up with tech innovation. \u201cCybersecurity for disruptive technologies remains inadequate when considering Bring Your Own Device (BYOD), cloud, Software Defined Networking (SDN) are always put it in place first and then secured later,\u201d Bragdon says.The survey identified eight common deficiencies, where spending and efforts do lag:\u2022 Most organizations do not take a strategic approach to cybersecurity spending.\u2022 Organizations do not assess security capabilities of third-party providers.\u2022 Supply chain risks are not understood or adequately assessed\u2022 Security for mobile devices is inadequate and has elevated risks\u2022 Cyber risks are not sufficiently assessed\u2022 Organizations do not collaborate to share intelligence on threats and responses\u2022 Insider threats are not sufficiently addressed\u2022 Employee training and awareness is very effective at deterring and responding to incidents, yet it is lacking at most organizations.The survey also found more than a third said that the number of security incidents detected increased over the previous year. So it\u2019s no surprise that more than 59% of respondents said that they were more concerned about cybersecurity threats this year than in the past. CEOs are certainly concerned. PwC\u2019s Annual Global CEO Survey 2014 found 69% of US respondents worried about the impact of cyber threats to their growth. Costs to Target, for instance, could go well into the hundreds of millions, with some estimates over $1 billion. Final costs won\u2019t be tallied until the lawsuits are done, to be sure, and it\u2019s unclear how much cyber security insurance will ultimately cover.[2013 results detailed in Why business is losing the war against cybercrime]One of the findings of the survey is that enterprises don\u2019t share enough intelligence on threats and responses. That may be starting to change, at least in the retail sector. Following numerous high-profile attacks, the retail industry is now looking at ways to effectively share cyber security information, including the establishment of a Merchant and Retail Industry Information Sharing and Analysis Center (ISAC). Essentially, ISACs provide a way to gather and share information about attacks and attack trends that target a particular industry. There are many ISACs already in place, primarily in the critical infrastructures including power, water, financial services and more than a dozen others.\u201cWorking in the financial sector I see the value of ISACs,\u201d says Ken Swick, technical information security officer at Citi Group. The types of threats one sector may be worried about can be different from another. By sharing this information between peers it allows for potentially proactive measures that can be taken before more institutions see a threat,\u201d Swick says.While average number of security incidents detected was 135 per organization, this does not account for incidents that go undetected, a potentially significant number given the 3,000 companies mentioned above that were unaware of cyber intrusions until notified by the FBI. Why such a poor showing? Because many enterprises aren\u2019t running mature information security programs, many agree.\u201cPrimarily, they are just running compliance programs,\u201d says Javvad Malik, security Analyst at The 451 Group.Bragdon agrees, and says \u201dcompliance-based security programs will not deliver effective cybersecurity, particularly in the post-perimeter enterprise, but businesses continue to focus on compliance.\u201dNot surprisingly, organizations that suffered a breach take their security programs more seriously, are also more likely to have an information security department that is in charge of responding to incidents. The study also found that large organizations are more apt to use up-to-date security controls, such as malware analysis, threat subscription services, and threat modeling to address overall cybersecurity risks. Is there room for hope of improvement in the immediate future? Not a lot.\u201cI am hopeful that the level of awareness driven to the Board and senior management by the likes of Target and the initiatives of the World Economic Forum will lock the concerns of cyber risk into the operating environment of most businesses. But as an old boss of mine was fond of saying, \u2018hope is for children,\u2019 \u201d Bragdon says.